Question 6 of 169After an information security incident, an organization created a comprehensive backup procedure involving regular, automated backups of all critical data to offsite storage locations. By doing so, which principle of information security is the organization applying in this case?
Correct Answer: C
Question 7 of 169A data processing tool crashed when a user added more data to the buffer than its storage capacity allows. The incident was caused by the tool's inability to bound check arrays. What kind of vulnerability is this?
Correct Answer: A
Question 8 of 169Which of the following best defines managerial controls?
Correct Answer: A
Question 9 of 169What is the objective of penetration testing in the risk assessment process?
Correct Answer: B
Question 10 of 169Which controls are related to the Annex A controls of ISO/IEC 27001 and are often selected from other guides and standards or defined by the organization to meet its specific needs?